监控Github上的漏洞、红队等信息。
GitHub监控消息提醒!!!
更新了:应急响应
描述:本系统为大型商场应急预案管理系统,基于SpringBoot和Vue技术构建,主要功能包括员工登录、个人信息修改、预案查看等。系统核心在于提高应急响应效率,确保员工和管理员在紧急情况下快速有效地执行预案,强化商场安全管理。通过整合SSM框架和MySQL数据库,提供稳定可靠的数据支持,实现前后端一体化设计,便于远程部署与调试,为商场运营保驾护航。
URL:https://github.com/3886370410/KxqzlUFkOM
标签:#应急响应
更新了:应急响应
描述:本系统为大型商场应急预案管理系统,基于SpringBoot和Vue技术构建,主要功能包括员工登录、个人信息修改、预案查看等。系统核心在于提高应急响应效率,确保员工和管理员在紧急情况下快速有效地执行预案,强化商场安全管理。通过整合SSM框架和MySQL数据库,提供稳定可靠的数据支持,实现前后端一体化设计,便于远程部署与调试,为商场运营保驾护航。
URL:https://github.com/3886370410/KxqzlUFkOM
标签:#应急响应
GitHub监控消息提醒!!!
更新了:Red Team
描述:Notes about Active Directory Red Teaming from CRTP
URL:https://github.com/k1tch0p/CRTP
标签:#Red Team
更新了:Red Team
描述:Notes about Active Directory Red Teaming from CRTP
URL:https://github.com/k1tch0p/CRTP
标签:#Red Team
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Detection for CVE-2025-37164
URL:https://github.com/rxerium/CVE-2025-37164
标签:#CVE-2025
更新了:CVE-2025
描述:Detection for CVE-2025-37164
URL:https://github.com/rxerium/CVE-2025-37164
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:RCE
描述:Hands-on penetration testing lab exploiting a Laravel Debug RCE vulnerability in a controlled environment.
URL:https://github.com/BlackOussema/laravel-debug-rce-lab
标签:#RCE
更新了:RCE
描述:Hands-on penetration testing lab exploiting a Laravel Debug RCE vulnerability in a controlled environment.
URL:https://github.com/BlackOussema/laravel-debug-rce-lab
标签:#RCE
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🔧 Exploit CVE-2025-33073 with this universal tool for Windows Domain Controllers, enabling SYSTEM-level code execution through automated techniques.
URL:https://github.com/Satirush/CVE-2025-14174-Poc
标签:#CVE-2025
更新了:CVE-2025
描述:🔧 Exploit CVE-2025-33073 with this universal tool for Windows Domain Controllers, enabling SYSTEM-level code execution through automated techniques.
URL:https://github.com/Satirush/CVE-2025-14174-Poc
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Proof of Concept for Authenticated RCE in Crafty Controller
URL:https://github.com/secdongle/POC_CVE-2025-14700
标签:#CVE-2025
更新了:CVE-2025
描述:Proof of Concept for Authenticated RCE in Crafty Controller
URL:https://github.com/secdongle/POC_CVE-2025-14700
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Lightweight Go toolkit plus a Dockerized Next.js lab to explore and triage CVE-2025-55182.
URL:https://github.com/r4j3sh-com/CVE-2025-55182
标签:#CVE-2025
更新了:CVE-2025
描述:Lightweight Go toolkit plus a Dockerized Next.js lab to explore and triage CVE-2025-55182.
URL:https://github.com/r4j3sh-com/CVE-2025-55182
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:应急响应
描述:“银狐木马”应急响应工具包
URL:https://github.com/anonymous-echo/Silver_Fox_IncidentResponse
标签:#应急响应
更新了:应急响应
描述:“银狐木马”应急响应工具包
URL:https://github.com/anonymous-echo/Silver_Fox_IncidentResponse
标签:#应急响应
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Detection for CVE-2025-40602
URL:https://github.com/rxerium/CVE-2025-40602
标签:#CVE-2025
更新了:CVE-2025
描述:Detection for CVE-2025-40602
URL:https://github.com/rxerium/CVE-2025-40602
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Ce dépôt fournit des règles Sigma prêtes pour la production afin de détecter l’exploitation de la vulnérabilité CVE-2025-6218 affectant WinRAR sous Windows.
URL:https://github.com/thesystemowner/CVE-2025-20393-POC
标签:#CVE-2025
更新了:CVE-2025
描述:Ce dépôt fournit des règles Sigma prêtes pour la production afin de détecter l’exploitation de la vulnérabilité CVE-2025-6218 affectant WinRAR sous Windows.
URL:https://github.com/thesystemowner/CVE-2025-20393-POC
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:High Fidelity Detection Mechanism for RSC/Next.js RCE (CVE-2025-55182 & CVE-2025-66478)
URL:https://github.com/aleksandrova834/react2shell-bypasswaf
标签:#CVE-2025
更新了:CVE-2025
描述:High Fidelity Detection Mechanism for RSC/Next.js RCE (CVE-2025-55182 & CVE-2025-66478)
URL:https://github.com/aleksandrova834/react2shell-bypasswaf
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:RCE
描述:A comprehensive vulnerability scanner for CVE-2025-13780, a Remote Code Execution (RCE) vulnerability in pgAdmin 4 versions ≤ 8.14.
URL:https://github.com/ThemeHackers/CVE-2025-13780
标签:#RCE
更新了:RCE
描述:A comprehensive vulnerability scanner for CVE-2025-13780, a Remote Code Execution (RCE) vulnerability in pgAdmin 4 versions ≤ 8.14.
URL:https://github.com/ThemeHackers/CVE-2025-13780
标签:#RCE
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Proof of Concept for Authenticated RCE in Crafty Controller <= 4.6.1
URL:https://github.com/Nosiume/CVE-2025-14700-poc
标签:#CVE-2025
更新了:CVE-2025
描述:Proof of Concept for Authenticated RCE in Crafty Controller <= 4.6.1
URL:https://github.com/Nosiume/CVE-2025-14700-poc
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:反序列化
描述:旨在提供一套简单高效、跨语言的数据封包(FB)与解包(deFB)方案(包含复杂对象序列化/反序列化),便于在对数据进行统一的二进制参数级交互(封包中无需存档额外元信息)
URL:https://github.com/xbcsoft/BC-FB-Standard
标签:#反序列化
更新了:反序列化
描述:旨在提供一套简单高效、跨语言的数据封包(FB)与解包(deFB)方案(包含复杂对象序列化/反序列化),便于在对数据进行统一的二进制参数级交互(封包中无需存档额外元信息)
URL:https://github.com/xbcsoft/BC-FB-Standard
标签:#反序列化
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:🔧 Exploit CVE-2025-33073 with this universal tool for Windows Domain Controllers, enabling SYSTEM-level code execution through automated techniques.
URL:https://github.com/Nixon-H/CVE-2025-68147-OSPOS-Stored-XSS
标签:#CVE-2025
更新了:CVE-2025
描述:🔧 Exploit CVE-2025-33073 with this universal tool for Windows Domain Controllers, enabling SYSTEM-level code execution through automated techniques.
URL:https://github.com/Nixon-H/CVE-2025-68147-OSPOS-Stored-XSS
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:React2shell vulnerable lab (CVE-2025-55182)
URL:https://github.com/pwnxpl0it/react2shell-lab
标签:#CVE-2025
更新了:CVE-2025
描述:React2shell vulnerable lab (CVE-2025-55182)
URL:https://github.com/pwnxpl0it/react2shell-lab
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:PoC for CVE-2025-65945 (Improper Verification of Cryptographic Signature in node-jws)
URL:https://github.com/jedisct1/CVE-2025-65945-poc
标签:#CVE-2025
更新了:CVE-2025
描述:PoC for CVE-2025-65945 (Improper Verification of Cryptographic Signature in node-jws)
URL:https://github.com/jedisct1/CVE-2025-65945-poc
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:Red Team
描述:🔍 Enhance AI-driven Red Teaming with RAIDER, combining reinforcement learning and language models for intelligent web exploitation and real-time reconnaissance.
URL:https://github.com/ArmitaKazemiNajafabadi/Multi-Adversary-CAGE4
标签:#Red Team
更新了:Red Team
描述:🔍 Enhance AI-driven Red Teaming with RAIDER, combining reinforcement learning and language models for intelligent web exploitation and real-time reconnaissance.
URL:https://github.com/ArmitaKazemiNajafabadi/Multi-Adversary-CAGE4
标签:#Red Team